Analyzing an incident
In Incidents & Events > Incidents > Incidents, select an incident or right-click an incident and select Analysis. Alternatively, you can double-click an incident to open the Incident Analysis pane. The Incident Analysis pane displays the incident's affected endpoint and user, audit history, attached events, reports, comments, and more.
Some features of incident analysis are only available with the applicable license. |
You can perform the following actions from the toolbar in the Incident Analysis pane:
Action |
Description |
---|---|
Edit Layout |
Edit the layout of the widgets. You can toggle and resize widgets according to your needs. Select the number of Columns to use for the layout. Use Undo and Redo as you make your changes to the layout. Click Save to save the changes, or Reset to reset to the defaults. |
Export Incident |
Export the incident analysis as HTML or PDF. In the Export Incident pane, you can review a preview of the export. You can toggle to Include Events and set the Maximum Rows for tables in the export in this pane as well. |
Enrich |
Enrich an indicator within the incident. For more information, see Indicator enrichment. |
Execute Playbook |
Select a playbook to execute. In the Select Playbook to Run pane, you can select a playbook from the table view and click Run. If there are configurable parameters for the playbook, you will be asked to configure them in the Manually Run Playbook dialog. |
Run Report |
Run a report against the affected endpoint. In the Run Report pane, select the Endpoint, Report, and Time Period. Only reports with Auto Cache and Extended Log Filtering enabled can be run from an incident. For more information, see Reports Settings tab. To attach the report to the incident, see Adding reports to an incident. |
Quarantine |
Quarantine the affected endpoint. In the Quarantine Endpoint dialog, select the Endpoint and the Connector. |
Refresh |
Refresh the widgets. |
The Incident Analysis pane includes the following widgets:
Widget |
Description |
---|---|
Incident Summary |
General information about the incident. You can review and modify the following information:
After making modifications, click Update to save your changes. |
Affected Endpoint/User |
Information about the affected endpoint/user. When multiple endpoints/users are associated with the incident, the total number is displayed and you can click the forward or backwards arrow on the tile to cycle between them. |
Comments |
Displays comments made by administrators for this incident with a timestamp. The most recent comments appear at the top of the list. Enter a comment and click POST to create a new comment. Existing comments can be edited and deleted by administrators. |
Affected Assets |
Displays affected asset(s) in a table view. Includes the endpoint, user, IP address, and MAC address of the asset. Click a user in the User column to display endpoint information in a separate dialog. |
Incident Timeline |
The timeline of the events raised for the incident. Scroll using your mouse wheel to change the displayed time frame. Mouse over the event to display a tooltip of its details. |
Events |
Displays the events that have been raised for this incident in a table view. You can use the search bar to search for events; toggle Match Case and Use Regular Expression using the icons in the search bar. You can perform the following actions after selecting an event:
|
Audit History |
Displays the history of changes made to an incident, including the user who made the change and information about the type of change that was made. Click Expand All to see additional details. |
Executed Playbooks |
The history of executed playbooks related to the incident. Click Execute Playbook to run a playbook configured with the On_Demand trigger. See Automation. |
Indicators |
Displays indicators attached to an incident from FortiGuard, FortiMail, or event handlers. Hover your mouse over an indicator to view detailed information from FortiGuard or click Details under Results to view information from FortiMail including sender reputation and email statistics. Indicator information can be attached to incidents using the FortiGuard and FortiMail connector in playbooks, or when an incident is created from an event that includes indicators identified in the event handler. |
Reports |
Attach and manage reports related to this incident. The reports are displayed in a table view, listing the report name, format, time range, and devices. |
Processes |
Displays endpoint processes associated with this incident including the process ID, process path, and network connection. Select a time period to view by choosing a snapshot from the snapshot dropdown. Processes can be displayed in a table format or as raw data. |
Software |
Displays endpoint software associated with this incident including the software, installation path, and installation time. Select a time period to view by choosing a snapshot from the snapshot dropdown. Software can be displayed in a table format or as raw data. |
Vulnerabilities |
Displays endpoint vulnerabilities associated with this incident including the vulnerability name, ID, severity, and category. Select a time period to view by choosing a snapshot from the snapshot dropdown. Vulnerabilities can be displayed in a table format or as raw data. |